Summary: A security threat to a water system may include the deliberate elimination/destruction of the safe water supply or the disruption of the delivery of the safe water supply for residential, commercial, industrial and agricultural purposes. System threats can come from within a water systems organization or from the outside. External threats include terrorist activities and civil disobedience. Threats may range from trespassing, tampering and vandalism to sabotage, theft and terrorism; these threats may be of a physical nature or they could be non-physical such as a cyber attack. Terrorist threats have been made against water systems. In most instances, the specifics of such attacks are unknown to most systems operators. Hazards from these threats include loss of power and communications, SCADA (supervisory control and data) cyber attack, explosions, intentional fires, chlorine release, broken water mains, chemical or biological contamination, pump failure, dam failure or storage tower failure. The focus of this presentation will address: conducting an on-site security audit using recommended national systems as well as local public and private resources.

http://www.isawwa.org/resource/resmgr/headshots-people/ganje.jpgPresenter: David Ganje, Ganje Law Offices

REGISTRATION & HOURS: This webinar will begin at 12:00pm and conclude by 1:00pm CST. Earn up to 1 PDH or RTC hour. After registering with Illinois Section AWWA, attendees will be furnished via email with all materials and links needed to participate in the webinar. Questions? Call 866-521-3595 Ext. 3

T-CON: Midwest Water & Wastewater Technology ConferenceABOUT THE CONFERENCE:The Midwest Water & Wastewater Technology Conference is the new and improved technology conference for industry professionals sponsored by the Illinois Section AWWA, Central States Water Environment Association, Illinois Water Environment Association and the College of Lake County. The Technology Conference incorporates multiple learning tracks related to the planning, design, implementation, and operation of water and wastewater-based technologies. The multi-track approach makes the conference ideal for utility managers, IT professionals, as well as operations and field staff. If you can only attend one technology conference this year, this is the one to attend!

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.